Ransomware will continue to be a top security concern in the coming years because of its ease of use and high profitability. For those unfamiliar with ransomware, it’s a type of malicious software (also known as malware) that, when downloaded to a computer, encrypts files so they can no longer be accessed without paying a ransom to the cybercrimina...
We have the answers
Search Results
Runaway data growth is probably one of the greatest risk factors facing organizations today. With many organizations struggling to deal with the rapid explosion of data, coupled with increasingly aggressive regulatory enforcement, how should they drive change in information governance to achieve operational efficiencies and guard against data breac...
In a rapidly evolving virtual world, many family offices are revising or creating document retention practices to make sure they have secure access to critical personnel and family financial records. Through a series of FAQs and a checklist of what documents to retain, you can ensure that you have an up-to-date document retention policy as part of ...
From phishing emails and identity theft to fraudulent money transfer requests, cybercriminals continue to find new ways to target individuals and their assets. This fundamentals checklist and recommendations can help protect you, your family, and your assets.
Designed to help your board take practical steps toward strengthening your organization's cyber risk, this data privacy and governance checklist outlines the basics for understanding your current data protection posture regarding the handling of personal and sensitive data. With the questions and responsibilities from the checklist, you c...
It's no secret that cryptocurrency markets and the larger digital assets economy have been roiled by recent instability, resulting in discussions about how regulatory initiatives, rising inflationary pressure, and public adoption trends will affect industry participants long term. To help navigate this challenging environment, a collection of ...
The polarizing and often misunderstood cryptoasset landscape has grown exponentially in recent years. While there are substantial risks associated with these young assets, they continue to grow in importance along with its blockchain technology. This paper reviews some of the space’s pressing issues, considers cryptoassets in a portfolio setting, a...
For charitably minded individuals, cryptocurrency investments—such as Bitcoin and Ethereum—held more than one year may provide a unique opportunity to leverage highly appreciated assets to achieve maximum impact with charitable giving. By donating cryptocurrency to charity, it can also unlock additional funds in two tax-smart ways. For more insi...
Many institutional investors have shed their skepticism and are dipping their toes into the crypto market, adding exposure through crypto funds, futures, and other emerging investment options. However, the world of crypto investing is still relatively uncharted territory. It is important to understand what cryptocurrencies are before investing or a...
The crypto landscape is constantly shifting and blockchain’s real value is almost impossible to assess. Despite the skepticism and confusion, this might be one of the most intriguing social and financial experiments of our lifetime. We examine crypto through a venture capital investment lens where most of these endeavors will fail but a small numbe...
The blockchain/crypto space continues to evolve at a blistering pace, with bitcoin reaching an all-time high of $65k in mid-April up from its $29k price at the beginning of 2021. The growth was fueled by a number of converging factors and game-changing developments in the crypto space. In addition to a crypto market update, this year-in-review repo...
By implementing proactive controls, organizations can minimize the chance of falling victim to a ransomware attack. This guide explores these eight leading cybersecurity practices, with critical steps to take and tips to incorporate into your approach: Know your environment Keep your data backups safe Implement a patch management program Bu...
Cyberattacks are impossible to completely prevent and the consequences of a data breach can be devastating. In addition to information and finances lost, breaches can result in downtime and reputational damage that can set your company far behind competitors. If your organization has experienced a cyberattack, there are three things that can b...
The growth of ChatGPT and other artificial intelligence (AI) tools is not slowing down. From small startups to multinational corporations, employees across the spectrum are leveraging ChatGPT to enhance their productivity and streamline their workflows. Given the potential risks—including confidentiality and personal data and privacy violations—ass...
With the increasingly complex patchwork of state privacy laws and regulatory compliance requirements, businesses operating in regulated industries, particularly in the financial services and healthcare sectors, need to ensure they are paying close attention to the details of the exemptions. Key differences in the exemptions built into these new sta...